The “Great Game” now is competing for the future of cyberspace between democratic and authoritarian governments, Homeland Security Secretary Alejandro Mayorkas said.
The launch continues the vendor's Connected Security strategy that involves enforcing security policies at every connection point across the network: switches, firewalls, routers, public and private cloud, and endpoints.
The bottom line is that the companies that adopted some level of zero trust are in a better position to deal with data breaches, IBM Security's Limor Kessem said.
CISOs now have to “think about how they bring more security to where their people are, instead of moving their people to where the security is,” Cisco’s Dug Song
The deal will allow Sysdig to shift security further left by integrating Apolicy’s infrastructure as code technology into its platform to better secure DevOps workflows.
Hackers, which Microsoft says in high confidence are based in China and have been dubbed DEV-0322, exploited the zero-day CVE-2021-35211 vulnerability.